UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 223
1.
  • A fair and scalable waterma... A fair and scalable watermarking scheme for the digital content trading industry
    Xiao, Xiangli; Su, Moting; Jiang, Jiajia ... Computers in industry, October 2024, Volume: 161
    Journal Article
    Peer reviewed

    The booming Internet economy and generative artificial intelligence have driven the rapid growth of the digital content trading industry, creating an urgent need for the fair protection of the rights ...
Full text
2.
  • A comprehensive web-based s... A comprehensive web-based system for flood inundation map generation and comparative analysis based on height above nearest drainage
    Li, Zhouyayan; Demir, Ibrahim The Science of the total environment, 07/2022, Volume: 828
    Journal Article
    Peer reviewed
    Open access

    It is critical to obtain accurate flood extent predictions in a timely manner in order to reduce flood-related casualties and economic losses from floods with greater magnitudes and fall outside the ...
Full text
3.
  • ms‐PoSW: A multi‐server aid... ms‐PoSW: A multi‐server aided proof of shared ownership scheme for secure deduplication in cloud
    Xiong, Jinbo; Zhang, Yuanyuan; Lin, Li ... Concurrency and computation, 10 February 2020, Volume: 32, Issue: 3
    Journal Article
    Peer reviewed

    Summary Collaborative cloud applications have become the dominant application mode in the big data era. These applications usually generate plenty of cooperative files, which share their ownerships ...
Full text
4.
  • An intelligent proactive de... An intelligent proactive defense against the client‐side DNS cache poisoning attack via self‐checking deep reinforcement learning
    Ma, Tengchao; Xu, Changqiao; Yang, Shujie ... International journal of intelligent systems, October 2022, 2022-10-00, 20221001, Volume: 37, Issue: 10
    Journal Article
    Peer reviewed

    A new class of poisoning attacks has recently emerged targeting the client‐side Domain Name System (DNS) cache. It allows users to visit fake websites unconsciously, thereby revealing their ...
Full text
5.
  • Comparison of Web Page Rend... Comparison of Web Page Rendering Methods Based on Next.js Framework Using Page Loading Time Test
    Hanafi, Roy; Haq, Abd; Agustin, Ninik Teknika (Institut Informatika Indonesia) (Online), 03/2024, Volume: 13, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    In the rapidly developing digital age, websites have become indispensable for interaction, information dissemination and transaction. To improve the performance of web applications, choosing the ...
Full text
6.
  • Efficient Integrity Auditin... Efficient Integrity Auditing Mechanism With Secure Deduplication for Blockchain Storage
    Zhang, Qingyang; Sui, Dongfang; Cui, Jie ... IEEE transactions on computers, 2023-Aug.-1, 2023-8-1, Volume: 72, Issue: 8
    Journal Article
    Peer reviewed

    Massive nodes in a blockchain form an off-chain distributed storage network to provide storage resources for users to meet large data upload requirements. However, this storage approach introduces ...
Full text
7.
  • HydroCompute: An open-sourc... HydroCompute: An open-source web-based computational library for hydrology and environmental sciences
    Ramirez, Carlos Erazo; Sermet, Yusuf; Demir, Ibrahim Environmental modelling & software : with environment data news, April 2024, 2024-04-00, Volume: 175
    Journal Article
    Peer reviewed
    Open access

    We present HydroCompute, a high-performance client-side computational library specifically designed for web-based hydrological and environmental science applications. Leveraging state-of-the-art ...
Full text
8.
  • Practically Deploying Heavy... Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning
    Meng, Zili; Guo, Yaning; Shen, Yixin ... IEEE/ACM transactions on networking, 2021-April, 2021-4-00, Volume: 29, Issue: 2
    Journal Article
    Peer reviewed

    Major commercial client-side video players employ adaptive bitrate (ABR) algorithms to improve the user quality of experience (QoE). With the evolvement of ABR algorithms, increasingly complex ...
Full text
9.
  • Bugs in our pockets: the ri... Bugs in our pockets: the risks of client-side scanning
    Abelson, Harold; Anderson, Ross; Bellovin, Steven M ... Journal of cybersecurity (Oxford), 01/2024, Volume: 10, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Abstract Our increasing reliance on digital technology for personal, economic, and government affairs has made it essential to secure the communications and devices of private citizens, businesses, ...
Full text
10.
Full text
1 2 3 4 5
hits: 223

Load filters